Terrorism, Security, and Computation

David Wright and Others
Series • 10 Books • Computers & Internet
Anomaly Detection Principles and Algorithms Anomaly Detection Principles and Algorithms
Kishan G. Mehrotra, Chilukuri K. Mohan & HuaMing Huang
Violence in Nigeria Violence in Nigeria
Patricia Taft & Nate Haken
Foreign Information Manipulation and Interference Foreign Information Manipulation and Interference
David Wright
Machine Learning Techniques to Predict Terrorist Attacks Machine Learning Techniques to Predict Terrorist Attacks
Laura Mostert, Roy Lindelauf, Chiara Pulice, Marnix Provoost, Priyanka Amin & V.S. Subrahmanian
Discovering Hidden Gems in Foreign Languages Discovering Hidden Gems in Foreign Languages
M.D. Miller
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
V. S. Subrahmanian, Judee K Burgoon & Norah E. Dunbar
A Machine Learning Based Model of Boko Haram A Machine Learning Based Model of Boko Haram
V. S. Subrahmanian, Chiara Pulice, James F. Brown & Jacob Bonen-Clark
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Maurizio Martellini & Andrea Malizia
The Global Cyber-Vulnerability Report The Global Cyber-Vulnerability Report
V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras & Aditya Prakash
Indian Mujahideen Indian Mujahideen
V.S. Subrahmanian, Aaron Mannes, Animesh Roul & R.K. Raghavan